National Identity Exchange Federation. Certificate Policy. Version 1.1

Size: px
Start display at page:

Download "National Identity Exchange Federation. Certificate Policy. Version 1.1"

Transcription

1 National Identity Exchange Federation Certificate Policy Version 1.1 September 9, 2014

2 Table of Contents 1 Introduction Overview Certificate Policy References Document Name and Identification Policy Administration Organization Administering the Document Contact Person Entity Determining CP Suitability CP Approval Procedures PKI Participants Certification Authorities Subscribers Relying Parties Definitions and Acronyms Publication and Repository Responsibilities Certificate Issuance Certificate Content Naming Types of Names Need for Names to Be Meaningful

3 4.1.3 Anonymity or Pseudonymity of Subscribers Uniqueness of Names Criteria for Interoperation Key Pair and Certificate Usage Subscriber Private Key and Certificate Usage Relying Party Public Key and Certificate Usage NIEF Center Private Key and Certificate Usage NIEF Center Public Key and Certificate Usage Protection of Certificate Private Key Technical Security Controls Key Pair Generation and Installation Cryptographic Module Standards and Controls Private Key Backup Private Key Archival Private Key Transfer Into or From a Cryptographic Module Private Key Storage on Cryptographic Module Method of Activating Private Key Other Aspects of Key Pair Management Activation Data Computer Security Controls Life Cycle Technical Controls Network Security Controls Facility, Management, and Operational Controls Physical Controls

4 6.2.2 Procedural Controls Personnel Controls Audit Logging Procedures Incident Response Compliance Audit and Other Assessments Other Business and Legal Matters Amendments Dispute Resolution Provisions

5 1 Introduction In order to allow for the connection of multiple parties in a trusted environment known as the National Identity Exchange Federation (NIEF), the National Identity Exchange Federation Center ( NIEF Center ) has adopted a suite of technical specifications and profiles that provide for the establishment and operation of secure, interoperable communication profiles between NIEF Center members for the purpose of exchanging information subject to appropriate access control policies. One of the specifications adopted by the NIEF Center is the NIEF Cryptographic Trust Model [NIEF Trust], which is a normative specification that describes the structure of a NIEF Cryptographic Trust Fabric document. This Trust Fabric concept comes from the Security Assertion Markup Language (SAML) 2.0 suite of standards specifically from the normative SAML 2.0 Metadata specification 1 and refers to a cryptographically signed XML document containing names, service endpoints, X.509 certificates, and other ancillary information about the members of a federation. In the NIEF security paradigm, a Trust Fabric document defines the membership of a federation at a specific point in time. While the NIEF Center and its members do not rely on a traditional Public Key Infrastructure (PKI) security model, their reliance on the NIEF Cryptographic Trust Fabric document requires implicit reliance on the proper lifecycle management process for the X.509 certificates that appear in that Trust Fabric document, as well as the private keys corresponding to those X.509 certificates. In addition, the NIEF Center and its members rely on the cryptographic integrity of the NIEF Cryptographic Trust Fabric document, which requires implicit reliance on the lifecycle management process for the X.509 certificate and corresponding private key used by the NIEF Center to sign the Trust Fabric document. For these reasons, the NIEF Center has adopted the NIEF Cryptographic Trust Fabric Management Guide [NIEF CTFMP] and this NIEF Center Certificate Policy [NIEF CP]. Due to the specific details of the NIEF Center security model described above, this certificate policy (CP) does not address all the standard CP topics in the same manner that a traditional PKI CP would cover them in a format such as that defined in [RFC 3647]. Instead, it addresses the topics that are relevant to the NIEF security model, and explains the differences between a traditional PKI security model and the NIEF security model where necessary. Definitions and Perspective of This Document The following paragraphs delineate the fundamental differences between the NIEF trust model and a traditional PKI trust model, to provide the appropriate context for the remainder of this document. 1 See 4

6 A traditional PKI CP typically describes the responsibilities of a single certificate authority (CA): an entity that issues certificates for use by one or more subscribers, for the benefit of one or more relying parties (RPs). A traditional PKI CP typically also describes the responsibilities of subscribers and relying parties. This NIEF CP uses the concepts of CA, subscriber, and RP, but defines them differently, as follows. 1. Subscribers to this CP include the NIEF Center as well as all NIEF Center members; however, subscribers to this CP are not subscribers in the traditional PKI sense wherein a CA has generated an X.509 certificate for them. (See the following item about certificate self-generation by subscribers.) 2. Each NIEF Center member acts as a CA in this CP for the X.509 certificates that it generates and manages, and which appear in the NIEF Cryptographic Trust Fabric. No NIEF Center member generates certificates for another member, i.e. each subscriber to this NIEF CP generates and manages its own certificates and corresponding public/private key pairs. 3. The NIEF Center acts as a CA in this CP for the X.509 certificate that it generates and manages, and which is used to cryptographically sign the NIEF Cryptographic Trust Fabric and thereby ensure the integrity of the Trust Fabric document. 4. Each NIEF Center member acts as a relying party (RP) in this CP, in that it relies on the integrity of the lifecycle management process for the X.509 certificates that are generated and managed by other NIEF Center member agencies, and which appear in the NIEF Cryptographic Trust Fabric. 5. Each NIEF Center member acts as a relying party (RP) in this CP, in that it also relies on the integrity of the lifecycle management process for the X.509 certificate that is generated and managed by the NIEF Center, and which is used to cryptographically sign the NIEF Cryptographic Trust Fabric document. Note that in this NIEF CP, organizational entities often have multiple roles (CA, subscriber, and RP), and therefore many of the sections of this document must be read from multiple perspectives to fully understand the responsibilities of each party. Note also that this CP pertains only to certificates that appear in the NIEF Cryptographic Trust Fabric or are used by NIEF to sign the NIEF Cryptographic Trust Fabric. This CP does not pertain to, and has no direct relation to, certificates that may be generated, managed, or purchased by the NIEF Center or NIEF Center member agencies for other purposes, such as authenticating users or establishing secure SSL/TLS sessions between HTTP user agents (web browsers) and secure web applications. Finally, note that the traditional PKI concept of a registration authority (RA) has no meaning in this CP, since the NIEF Center s security model does not require registration of subscribers with a CA in the traditional sense. Applicability of This Document This CP applies to the NIEF Center and all its members: Identity Provider Organizations (IDPOs), Attribute Provider Organizations (APOs), Service Provider Organizations (SPOs), 5

7 Service Consumer Organizations (SCOs), and Trusted Identity Broker Organizations (TIBOs). (All of these organizations are collectively referred to as the subscribers to this CP.) The NIEF Center is also a subscriber to this CP, but it does not participate in operational information-sharing transactions with other members. This CP applies to the certificate(s) and private key(s) used for signing the NIEF Cryptographic Trust Fabric. All requirements in this document that are not targeted specifically towards one of the categories of subscribers above are applicable to all subscribers. 1.1 Overview Certificate Policy The term certificate policy (CP) is defined by the X.509 standard as a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. This CP is geared towards the NIEF Center and its members (subscribers) that operate trusted software system endpoints within the federation. (A trusted software system endpoint can be an identity provider, service provider, trusted identity broker, or other service.) The NIEF Cryptographic Trust Fabric includes an entry for each trusted software system endpoint in the federation. The Trust Fabric entry for a trusted endpoint includes basic information about the endpoint (e.g. its URL, points of contact for the organization that manages the endpoint, etc.) as well as one or more X.509 certificates used by the endpoint for cryptographic operations. The purpose of the Trust Fabric is to attest, on behalf of the NIEF Center, that the X.509 certificate(s) assigned to an endpoint are legitimate and trustworthy. The purpose of this CP is to set forth a list of rules that each subscriber must obey to help ensure that the X.509 certificates assigned to their trusted software service endpoints are in fact legitimate and trustworthy, and that the entire NIEF Cryptographic Trust Fabric document maintains its legitimacy and trustworthiness at all times References Table 1 provides a list of references for documents that are related to this CP. 6

8 References for Related Documents Document ID Document Name and URL NIEF Terms NIEF Terminology Reference NIEF Audit NIEF Audit Policy NIEF CTFMP NIEF Cryptographic Trust Fabric Management Policy NIEF Trust NIEF Cryptographic Trust Model NIEF U2S Profile NIEF Web Browser User-to-System Profile NIEF S2S Profile NIEF Web Services System-to-System Profile NIEF Bylaws NIEF Center Bylaws NIEF OPP NIEF Center Operational Policies and Procedures NIEF CP NIEF Center Certificate Policy (This Document) FIPS Federal Information Processing Standard (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, 3 December RFC 3647 Internet Engineering Task Force (IETF) Request for Comments 3647, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, November 2003 Table 1: References for Related Documents 1.2 Document Name and Identification The name of this document is: National Identity Exchange Federation Center Certificate Policy. 1.3 Policy Administration This section includes the name and mailing address of the organization that is responsible for the drafting, registering, maintaining, and updating of this CP. It also includes the name, electronic mail address, and telephone number of a contact person. 7

9 1.3.1 Organization Administering the Document The NIEF Center is the administering organization for this CP. The NIEF Center s full name and mailing address is: Georgia Tech Applied Research Corporation National Identity Exchange Federation Center Georgia Tech Research Institute ITTL/IEAD th Street NW Atlanta, GA Contact Person The contact person for the NIEF Center is: John Wandelt, National Identity Exchange Federation Center Director Georgia Tech Research Institute ITTL/IEAD th Street NW Atlanta, GA Phone: John.Wandelt@gtri.gatech.edu Entity Determining CP Suitability The NIEF Center and NIEF Advisory Board (AB) determine the suitability of this CP CP Approval Procedures This CP requires approval by the NIEF Center Director and NIEF Executive Committee. 1.4 PKI Participants This CP does not pertain directly to the operation of a PKI; however, this CP does impact the NIEF Center, and all NIEF Center member agencies, in various ways as called out in the following subsections Certification Authorities Each NIEF Center member acts as a CA for the X.509 certificates that it generates and manages, and which appear in the NIEF Cryptographic Trust Fabric; however, no NIEF Center member generates certificates for another member. 8

10 In addition, the NIEF Center acts as a CA for the X.509 certificate that it generates and manages, and which is used to cryptographically sign the NIEF Cryptographic Trust Fabric and thereby ensure the integrity of the Trust Fabric document. But the NIEF Center does not generate certificates for any member agencies Subscribers Subscribers to this CP include the NIEF Center as well as all NIEF Center member agencies; however, subscribers to this CP are not subscribers in the traditional PKI sense wherein a CA has generated an X.509 certificate for them. As noted in Section 1.4.1, each subscriber to this CP acts as its own CA for the certificates that it uses Relying Parties A relying party is a recipient of a certificate that acts in reliance on that certificate and/or any digital signatures verified using that certificate and/or any messages encrypted using that certificate. Organizations that are NIEF Center members are relying parties of the X.509 certificates covered by this CP, and the NIEF Trust Fabric in which the certificates are published, in that they rely on digital signatures and message encryption operations made using certificates covered by this CP and published in the NIEF Trust Fabric. Specifically, Service Provider Organizations (SPOs), Service Consumer Organizations (SCOs), Identity Provider Organizations (IDPOs), Attribute Provider Organizations (APOs), and Trusted Identity Broker Organizations (TIBOs) rely upon these certificates to authenticate digitally signed messages and to decrypt digitally encrypted messages, in the following scenarios. 1. When a NIEF Identity Provider (IDP) or Trusted Identity Broker (TIB) receives a message from a NIEF Service Provider (SP) as part of a transaction that conforms to a NIEF Communication Profile ([NIEF U2S Profile] or [NIEF S2S Profile]), it relies on a certificate covered by this CP and published in the NIEF Trust Fabric to support verification of a digital signature that effectively verifies that the message signer is a legitimate, trustworthy SP in NIEF. In this scenario, the NIEF IDP or TIB may also rely on a certificate covered by this CP and published in the NIEF Trust Fabric to support decryption of an encrypted message, or decryption of one or more encrypted parts of a message. 2. When a NIEF SP receives a message from a NIEF IDP or a NIEF TIB as part of a transaction that conforms to a NIEF Communication Profile ([NIEF U2S Profile] or [NIEF S2S Profile]), it relies on a certificate covered by this CP and published in the NIEF Trust Fabric to support verification of a digital signature that effectively verifies that the message signer is a legitimate, trustworthy IDP or TIB in NIEF. In this scenario, the NIEF SP may also rely on a certificate covered by this CP and published in the NIEF Trust Fabric to support decryption of an encrypted message, or decryption of one or more encrypted parts of a message. 9

11 3. When a NIEF web services component (Attribute Provider (AP), Attribute Consumer (AC), Web Service Consumer (WSC), or Web Service Provider (WSP)) receives a message from another NIEF web services component as part of a transaction that conforms to [NIEF S2S Profile], it relies on a certificate covered by this CP and published in the NIEF Trust Fabric to support verification of a digital signature that effectively verifies that the message signer is a legitimate, trustworthy web services component in NIEF. In this scenario, the message recipient may also rely on a certificate covered by this CP and published in the NIEF Trust Fabric to support decryption of an encrypted message, or decryption of one or more encrypted parts of a message. In addition to these member-to-member trust relationships, whenever NIEF Center members process a new version of the NIEF Trust Fabric document, they rely on the X.509 certificate that is used by the NIEF Center to cryptographically sign the NIEF Trust Fabric document. 1.5 Definitions and Acronyms The following acronyms are used in this CP and related GFIPM and NIEF documents. Some of the terms listed below are defined or described in more detail in [GFIPM Terms]. Acronym AC AP APO CA CP CPS CRL CSR DS GFIPM IDP IDPO NIEF Meaning Attribute Consumer Attribute Provider Attribute Provider Organization Certificate Authority Certificate Policy Certification Practice Statement Certificate Revocation List Certificate Signing Request Discovery Service Global Federated Identity and Privilege Management Identity Provider Identity Provider Organization National Identity Exchange Federation 10

12 Acronym OCSP PKI RA SP SCO SPO TIB TIBO WSC WSP URL Meaning Online Certificate Status Protocol Public Key Infrastructure Registration Authority Service Provider Service Consumer Organization Service Provider Organization Trusted Identity Broker Trusted Identity Broker Organization Web Service Consumer Web Service Provider Uniform Resource Locator 2 Publication and Repository Responsibilities The NIEF Center maintains two document repositories. All policy documents, forms, and signed agreements submitted by NIEF Center members, are published in the NIEF Portal, which is a non-public repository. They are available to NIEF Portal account holders, subject to appropriate access controls. 2 Also, the current NIEF Cryptographic Trust Fabric document is posted at the following URL and is publicly available for download. Subscriber certificates are not published in any other certificate repository. 3 2 NIEF Portal account holders with the Organization Administrator or Federation Administrator role are eligible to download and view NIEF policy documents via the portal. Other users are denied access. 11

13 All NIEF policy documents, including this CP and related NIEF Center policies (e.g. [NIEF Bylaws], etc.), are available to current and prospective NIEF members upon written request to the NIEF Center. 3 Certificate Issuance The NIEF Center does not operate a traditional CA, and therefore does not issue certificates in the traditional way. In lieu of a certificate application process, NIEF stipulates a formal application and onboarding process, which is described in [NIEF OPP]. After undergoing the formal application and onboarding process, a subscriber MUST generate its own certificate and prove possession of the private key corresponding to that certificate before the NIEF Center will allow that certificate to be installed in the NIEF Trust Fabric. See [NIEF CTFMP] more information about this process. 4 Certificate Content This section and its subsections pertain to the content and use of certificates that are covered by this CP. The NIEF Center does not issue private keys or certificates to NIEF Center members; however, it does perform certain security functions and stipulate certain subscriber identification and authentication rules that parallel the subscriber identification and authentication rules stipulated for a traditional PKI. All rules described in this section are oriented towards the goal of ensuring the integrity of the NIEF Cryptographic Trust Fabric and the certificates that it contains. 4.1 Naming This section pertains to naming and name management issues that can arise for names within X.509 certificates. As NIEF does not employ a traditional PKI trust model, many naming issues that pertain to a PKI are either not applicable to NIEF or are applicable in a slightly different context than what is typically expected in a PKI. Each subsection provides appropriate details as needed Types of Names A certificate that is covered by this CP MAY contain any type of name, as long as the name represented is meaningful according to the requirements stipulated in Section In a traditional PKI model, subscriber certificates are typically published in a directory, e.g. X.500 or LDAP. The Trust Fabric model used by NIEF does not require separate publication of certificates in any location other than the NIEF Trust Fabric. 12

14 4.1.2 Need for Names to Be Meaningful A certificate that is covered by this CP MUST contain a name that clearly and uniquely identifies the organization that owns the certificate. In the case where multiple certificates pertain to the same organization, it is RECOMMENDED that the certificate name also identify the system or service endpoint of the subscriber and/or the purpose for which the certificate is to be used (e.g. signing only, encryption only, or both) Anonymity or Pseudonymity of Subscribers This CP does not permit anonymity or pseudonymity of subscribers. Subscribers to this CP include the NIEF Center and NIEF Center members, and the identity of each subscriber is well known to all other subscribers Uniqueness of Names Due to the naming rules stipulated in Section 4.1.2, name collisions between certificates are possible only for certificates that pertain to the same organization. In the case where multiple certificates pertain to the same organization, it is RECOMMENDED that the certificate name also identify the system or service endpoint of the subscriber and/or the purpose for which the certificate is to be used (e.g. signing only, encryption only, or both). 4.2 Criteria for Interoperation For proper interoperation with other subscribers and inclusion in the NIEF Cryptographic Trust Fabric, a certificate MUST meet the following criteria. 1. It MUST be a valid X.509 certificate. 2. It MUST contain the following attributes. a. Subject (See Section 4.1 and its subsections for subject naming rules.) b. Version (The X.509 version number to which this certificate conforms.) c. Validity (The Not Before and Not After dates of validity.) d. Algorithm ID (The public-key algorithm used to generate the certificate.) e. Signature Algorithm (The algorithm used to sign the certificate.) f. Public Key 3. It MAY contain additional attributes. 5 Key Pair and Certificate Usage This section describes acceptable and prohibited usage of certificates to which this CP applies, as well as the public/private key pairs corresponding to those certificates. 13

15 5.1 Subscriber Private Key and Certificate Usage NIEF Center members MAY use certificates to which this CP applies, as well as their corresponding private keys, for the following purposes. 1. Cryptographic signing of messages that are to be sent between trusted software service endpoints within NIEF as part of transactions that conform to NIEF Communication Profiles ([NIEF U2S Profile] or [NIEF S2S Profile]). 2. Decryption of encrypted messages or encrypted parts of messages sent between trusted software service endpoints within NIEF as part of transactions that conform to NIEF Communication Profiles ([NIEF U2S Profile] or [NIEF S2S Profile]). All other uses are prohibited. 5.2 Relying Party Public Key and Certificate Usage Relying parties MAY use certificates to which this CP applies, as well as their corresponding public keys, for the following purposes. 1. Verification of digital cryptographic signatures on messages sent between trusted software service endpoints within NIEF as part of transactions that conform to NIEF Communication Profiles ([NIEF U2S Profile] or [NIEF S2S Profile]). 2. Encryption of messages or parts of messages that are to be sent between trusted software service endpoints within NIEF as part of transactions that conform to NIEF Communication Profiles ([NIEF U2S Profile] or [NIEF S2S Profile]). All other uses are prohibited. 5.3 NIEF Center Private Key and Certificate Usage The NIEF Center MAY use its certificate to which this CP applies, as well as its corresponding private key, for the purpose of cryptographically signing individual entries within and/or the entire NIEF Trust Fabric document. All other uses are prohibited. 5.4 NIEF Center Public Key and Certificate Usage Relying parties MAY use the NIEF Center s certificate to which this CP applies, as well as its corresponding public key to verify the NIEF Center s digital cryptographic signature on the NIEF Trust Fabric document and individual entries within the document. All other uses are prohibited. 14

16 6 Protection of Certificate Private Key 6.1 Technical Security Controls This section contains rules representing the minimal acceptable level of technical protection that MUST be applied to sensitive private key material corresponding to certificates covered by this CP and the systems on which the private key material is used. To help ensure the trustworthiness of the NIEF Cryptographic Trust Fabric, all subscribers MUST obey the rules outlined in this section. In some circumstances, a subscriber may already have policies and procedures in place that preclude their ability to obey these rules. In this circumstance, the subscriber MUST notify the NIEF Center in writing of its inability to meet these requirements, and MUST also provide an explanation of why it is unable to meet the requirements Key Pair Generation and Installation This section and its subsections stipulate public/private key pair generation and installation rules for key pairs that correspond to certificates covered by this CP Key Pair Generation The key pair MUST be generated by the subscriber using the RSA key generation algorithm 4, and MUST be generated on the physical machine or module within which it will be used. In addition, private key material MUST NOT appear outside of the module from which it was generated unless it is encrypted for local transmission or for processing or storage by a key recovery mechanism Key Sizes All certificates governed by this CP SHALL use at least 2048-bit RSA and Secure Hash Algorithm 256 (SHA-256). If the NIEF Center determines that the security of a particular algorithm may be compromised, it SHALL immediately remove all certificates that use the algorithm from the NIEF Trust Fabric. 4 For more information about how to generate a public/private key pair using the RSA algorithm, please see For more information about the mathematics of the RSA algorithm, please see 15

17 Public Key Parameters Generation and Quality Checking Public key parameters SHALL be generated and checked in accordance with the standard that defines the cryptographic algorithm in which the parameters are to be used Key Usage Purposes (As Per X.50vkey Usage Field) See Section 5. In general, keys MAY be used for signing, encryption, or both. For keys that appear in the NIEF Trust Fabric, key usage is indicated by other attributes in the NIEF Trust Fabric document. For the key that the NIEF Center uses to sign the NIEF Trust Fabric, key usage is limited to generating digital signatures for the NIEF Trust Fabric Cryptographic Module Standards and Controls Cryptographic modules employed for the generation and operational use of public/private key pairs corresponding to certificates governed by this CP MUST conform to Security Level 1 or higher as specified in [FIPS 140-2] Private Key Backup Copies of private keys governed by this CP are strongly discouraged, but MAY be made to provide a backup in the event of destruction or failure of the original. If undertaking a private key backup procedure, a subscriber MUST do so in a fashion that ensures proper accountability for all actions performed Private Key Archival Private keys governed by this CP SHALL NOT be archived Private Key Transfer Into or From a Cryptographic Module Private keys governed by this CP SHALL be generated by and remain in a cryptographic module. Private keys MAY be backed up in accordance with the rules stipulated in Section In the event a private key, generated by and in a cryptographic module, MUST be transported into another cryptographic module, the second or recipient module MUST have equal or greater security controls, the private key MUST be encrypted during transport, and private key material 5 FIPS PUB states that: Security Level 1 allows the software and firmware components of a cryptographic module to be executed on a general purpose computing system using an unevaluated operating system. Note that security levels defined in [FIPS 140-2] are unrelated to levels of assurance for electronic identities as defined in NIST PUB

18 MUST NOT exist in plaintext outside the boundaries of the source or destination cryptographic modules Private Key Storage on Cryptographic Module No stipulation beyond what is specified in [FIPS 140-2] Method of Activating Private Key Private keys corresponding to certificates in the NIEF Trust Fabric are used for digital signature and encryption operations on information-sharing transactions between NIEF Center members. According to previously articulated rules in this CP, these private keys MUST reside on secure servers, within cryptographic modules, at all times, except for certain exceptional conditions such as private key backup and transfer from one cryptographic module to another. Due to the location of these keys, it is generally infeasible for them to be activated (for example, via a passphrase) on a per-crypto-operation basis, or even on a short-term cache basis for use in crypto operations. It is therefore assumed that these keys require no method of activation, other than knowledge of the private key material. The private key used by the NIEF Center to sign the NIEF Trust Fabric MUST be maintained on an offline machine in a location that is locked at all times and requires 2-factor access control (e.g. key card + PIN) for physical access. This private key SHALL require a pass-phrase or PIN for activation, and the pass-phrase or PIN SHALL be protected from disclosure to unauthorized personnel Method of Deactivating Private Key Per the preceding section, private keys corresponding to certificates in the NIEF Trust Fabric do not require activation, so this section is not applicable to those keys. For the private key used by the NIEF Center to sign the NIEF Trust Fabric, the cryptographic module SHALL be deactivated after use, e.g. via a manual logout procedure, or automatically after a period of inactivity Method of Destroying Private Key Private signature keys SHALL be destroyed in accordance with [FIPS 140-2] when they are no longer needed, or when the certificates to which they correspond expire or are revoked Other Aspects of Key Pair Management All certificates governed by this CP SHALL be subject to revocation and/or re-key in the event of a personnel change in which a person previously authorized to perform trusted role operations on the corresponding private key is no longer authorized to do so. 17

19 Public Key Archival Public keys that appear in the NIEF Trust Fabric are archived as part of their publication in the NIEF Trust Fabric. Public keys corresponding to the private keys used by the NIEF Center to sign the NIEF Trust Fabric are also archived by virtue of being included in the NIEF Trust Fabric Certificate Operational Periods and Key Pair Usage Periods Certificates that are governed by this CP and also appear in the NIEF Trust Fabric SHALL be limited to a maximum lifetime of two (2) years. Certificates corresponding to private keys used by the NIEF Center to sign the NIEF Trust Fabric SHALL be limited to a maximum lifetime of five (5) years. Refer to [NIEF CTFMP] for more information about the certificate re-key process Activation Data For certificates that are governed by this CP and also appear in the NIEF Trust Fabric, this section and its subsections do not apply. (See Section for more details.) For certificates corresponding to private keys used by the NIEF Center to sign the NIEF Trust Fabric, the following subsections apply Activation Data Generation and Installation For certificates corresponding to private keys used by the NIEF Center to sign the NIEF Trust Fabric, the activation data used to unlock the private keys SHALL have an appropriate level of strength. If the activation data must be transmitted, it SHALL be via an appropriately protected channel, and distinct in time and place from the associated cryptographic module. If the NIEF Center uses passwords as activation data for the private key, the activation data SHALL be changed upon re-key, if not more frequently Activation Data Protection For certificates corresponding to private keys used by the NIEF Center to sign the NIEF Trust Fabric, the data used to unlock the keys SHALL be protected from disclosure. If the activation data is recorded, it SHALL be secured at the level of assurance associated with the activation of the cryptographic module, and SHALL NOT be stored with the cryptographic module Computer Security Controls As part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local security policies and practices, including those related to computer security controls. 18

20 The following computer security functions SHALL be provided by the operating system, or through a combination of operating system, software, and physical safeguards for all computer systems on which one or more private keys governed by this CP reside. 1. Require authenticated logins. 2. Provide discretionary access control. 3. Provide non-discretionary access controls for policy-enforced operations. 4. Provide a security audit capability. 5. Enforce separation of duties for locally defined trusted identities and/or roles. (See Section ) 6. Require identification and authentication of trusted identities and trusted roles if applicable. 7. Require use of cryptography for session communication, if and when appropriate. Refer to [NIEF Trust], Section Require a trusted path for identification of trusted identities and/or roles. 9. Enforce process isolation. Subscriber equipment SHALL be configured and operated to activate these controls Life Cycle Technical Controls The following life cycle technical controls pertain to all subscriber systems on which private keys governed by this CP reside. 1. The hardware and software SHALL be procured in a fashion that reduces the likelihood of tampering for any particular component. 2. The hardware and software SHALL be limited to performing NIEF-related functions. This MAY include providing specific service endpoints at which the keys and certificates governed by this CP are used. 3. Proper care (e.g. anti-virus, intrusion detection software) SHALL be taken to prevent malicious software from being loaded onto the equipment. 4. Hardware and software updates SHALL be obtained and installed by trusted and trained personnel in a defined manner. 5. Chain of custody mechanisms SHALL be provided throughout the lifecycle of the system, to include (a) shipment and delivery of hardware and software from the purchase location to the subscriber s physical location, (b) creation, storage, transport, or manipulation of subscriber key material, and (c) physical or logical access to subscriber systems. 6. Controls pertaining to configuration, modifications, and upgrades SHALL be provided. In addition, there SHALL be a mechanism on these systems for detecting unauthorized modification to the local software or configuration. 19

21 Network Security Controls Subscribers SHALL employ appropriate security measures to ensure systems housing private key material subject to this CP are guarded against subversion and intrusion attacks. Such measures MAY include, but are not limited to, firewalls, intrusion detection devices, and filtering routers. Unused network ports and services SHALL be turned off, and any network software and user accounts present SHALL be restricted to the functioning of the subscriber systems. In addition, as part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local security policies and practices, including those related to network security controls. 6.2 Facility, Management, and Operational Controls This section and its subsections address issues relating to the physical facility in which sensitive key material is housed by subscribers, as well as subscribers operational controls relating to personnel Physical Controls As part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local security policies and practices, including those related to physical controls. Subscriber servers, workstations, and other sensitive components MUST be located in an environment that prevents unauthorized access to equipment and records. Subscribers MUST use facilities that are protected with intrusion alarms or actively monitored for protection against intrusion, regardless of assurance level Site Location and Construction The location and construction of the facility housing subscriber equipment and operations SHALL be locked at all times and require restricted access. The subscriber approves the authorized list of personnel into this facility Physical Access Subscriber equipment housing or storing private key material subject to this CP SHALL always be protected from unauthorized access and subversion as stipulated in Sections and Additionally, these security mechanisms SHALL be commensurate with the level of threat in the equipment environment. 20

22 Re-use and Repurposing of Physical Equipment Subscriber equipment housing private key material that is subject to this CP SHALL be properly sanitized prior to re-use or repurposing Waste Disposal Sensitive equipment that is no longer in operation and considered to be waste SHALL be destroyed in a particular manner rendering the equipment impossible to reuse. In cases where data is involved (hard drives, tokens etc.), the data SHALL be destroyed in a manner that prevents data recovery Procedural Controls As part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local security policies and practices, including those related to procedural controls. The following sections address procedural controls that MUST be in place with respect to sensitive private key material corresponding to certificates covered by this CP and the systems on which the private key material is used Trusted Persons and Trusted Roles A trusted person is one who performs functions that can introduce security problems if not carried out properly, whether accidentally or maliciously. A trusted role is one whose incumbent performs functions that can introduce security problems if not carried out properly, whether accidentally or maliciously. Trusted persons and persons selected to fill trusted roles MUST be responsible for their designated actions or the integrity of the NIEF Trust Fabric is weakened. Functions performed by trusted persons or persons in trusted roles form the basis of trust for all uses of the NIEF Trust Fabric. The NIEF Center shall maintain a list of appropriate trusted persons, per the local procedural controls that it implements. Subscribers to this CP SHALL maintain a list of appropriate trusted persons and (if applicable) trusted roles, per the local procedural controls that they implement Number of Persons Required Per Task To ensure the integrity of subscriber operations, it is RECOMMENDED that wherever possible and as applicable per local procedural controls, a separate individual be identified for each trusted role. Additionally, redundancy of personnel SHOULD also be observed in support of subscriber operations in the event of personnel absence. 21

23 Identification and Authentication of Trusted Persons An individual SHALL be REQUIRED to identify and authenticate himself/herself as a trusted person before being permitted to perform any actions set forth by the subscriber for that role or identity Personnel Controls As part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local security policies and practices, including those related to personnel controls. The following sections address personnel controls that MUST be in place with respect to sensitive private key material corresponding to certificates covered by this CP and the systems on which the private key material is used Qualifications, Experience, and Clearance Requirements Each subscriber SHALL positively identify and maintain an up-to-date list of the individuals that are responsible and accountable for the management of the subscriber s operational environment. In addition, persons selected to perform sensitive operations or fill trusted roles SHALL be chosen on the basis of loyalty, trustworthiness, and integrity Background Check Procedures Each subscriber SHALL implement a background check procedure to demonstrate that requirements set forth in Section are met. Such procedures SHALL be performed solely to determine the suitability of a person to fill a trusted role as defined by a subscriber Training Requirements Each subscriber SHALL implement a policy whereby all persons trusted with respect to the operation of any equipment containing certificates or private keys governed by this CP SHALL receive comprehensive training. Training SHALL be conducted in the following areas. 1. All certificate management duties they are expected to perform 2. Operation of certificate management software and hardware in use on the system 3. Incident response and business continuity procedures Retraining frequency and requirements Each subscriber SHALL implement a policy whereby all trusted persons SHALL be aware of changes in the subscriber s operation that may occur as a result of changes in the subscriber s local security policy or changes to this CP. 22

24 Sanctions for Unauthorized Actions Each subscriber SHALL take appropriate administrative and disciplinary actions against personnel who have performed actions that are not authorized in this CP and could result in security vulnerabilities for the subscriber or other NIEF Center members. This MAY include revocation of digital credentials Independent Contractor Requirements Contractor personnel employed to perform functions pertaining to each subscriber s operational environment SHALL meet applicable requirements set forth in this CP Documentation Supplied To Personnel Each subscriber SHALL make available to appropriate personnel the certificate policies it supports, as well as any relevant statutes, policies, or contracts that apply to the person s duties Audit Logging Procedures All subscribers to this CP SHALL generate audit log files for all events relating to the security of the subscriber s systems. Where possible, the security audit logs SHALL be automatically collected. Where this is not possible, a logbook, paper form, or other physical mechanism SHALL be used. All security audit logs, both electronic and non-electronic, SHALL be retained and made available during compliance audits. In addition, as part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local audit logging policies and procedures Incident Response As part of the NIEF application and onboarding processes (see [NIEF OPP]), subscribers fully disclose their local security policies and practices, including those related to incident response and data compromise. As part of its incident and compromise handling procedures, each subscriber SHALL implement a procedure whereby it contacts the NIEF Center promptly upon discovery of any incident in which private key material governed by this CP was, or might have been, compromised. See also [NIEF CTFMP]. 7 Compliance Audit and Other Assessments The NIEF Center and NIEF members MUST comply with the audit and assessment requirements defined in the NIEF Audit Policy [NIEF Audit]. 23

25 8 Other Business and Legal Matters This section and its subsections pertain to the topic of business and legal matters that may affect this CP. Generally, these topics are beyond the scope of this CP and addressed in [NIEF Bylaws]. 8.1 Amendments Amendments to this CP are covered under Section 6 of [NIEF OPP], Change Management for Normative Standards. In addition, amendments to this CP require approval by the NIEF Center Director and NIEF Executive Committee. 8.2 Dispute Resolution Provisions All disputes SHALL be resolved as per the rules stipulated in [NIEF Bylaws] and [NIEF OPP]. 24

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016 National Identity Exchange Federation Trustmark Signing Certificate Policy Version 1.0 Published October 3, 2014 Revised March 30, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents

More information

National Identity Exchange Federation. Terminology Reference. Version 1.0

National Identity Exchange Federation. Terminology Reference. Version 1.0 National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1 National Identity Exchange Federation Web Services System- to- System Profile Version 1.1 July 24, 2015 Table of Contents TABLE OF CONTENTS I 1. TARGET AUDIENCE AND PURPOSE 1 2. NIEF IDENTITY TRUST FRAMEWORK

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Version 4.0 Effective Date: September 18, 2013 Table of Contents

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5

More information

OpenADR Alliance Certificate Policy. OpenADR-CP-I

OpenADR Alliance Certificate Policy. OpenADR-CP-I Notice This document is a cooperative effort undertaken at the direction of the OpenADR Alliance and NetworkFX, Inc. for the benefit of the OpenADR Alliance. Neither party is responsible for any liability

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Afilias DNSSEC Practice Statement (DPS) Version

Afilias DNSSEC Practice Statement (DPS) Version Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.

More information

X.509 Certificate Policy. For The Federal Bridge Certification Authority (FBCA)

X.509 Certificate Policy. For The Federal Bridge Certification Authority (FBCA) X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) September 10, 2002 Signature Page Chair, Federal Public Key Infrastructure Policy Authority DATE Table of Contents 1. INTRODUCTION...

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY November 2015 Version 4.0 Copyright 2006-2015, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

TeliaSonera Gateway Certificate Policy and Certification Practice Statement

TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway Certificate Policy and Certification Practice Statement v. 1.2 TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway CA v1 OID 1.3.6.1.4.1.271.2.3.1.1.16

More information

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12 APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification

More information

LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS)

LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) INFORMATION SECURITY POLICY ISSUE SPECIFIC POLICY VERSION: V003 2017-05-11 EFFECTIVE DATE: 2017-05-11 LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) Law Trusted Third Party

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP)

Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP) Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP) Version 8.12 May 2017 Copyright, Lockheed Martin, 2017 Questions or comments regarding the Lockheed Martin epki Certification

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

AlphaSSL Certification Practice Statement

AlphaSSL Certification Practice Statement AlphaSSL Certification Practice Statement Date: December 16th 2008 Version: v1.2 Table of Contents DOCUMENT HISTORY... 3 ACKNOWLEDGMENTS... 3 1.0 INTRODUCTION... 4 1.1 OVERVIEW... 4 1.2 ALPHASSL CERTIFICATE

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

e-authentication guidelines for esign- Online Electronic Signature Service

e-authentication guidelines for esign- Online Electronic Signature Service e-authentication guidelines for esign- Online Electronic Signature Service (Issued under Electronic Signature or Electronic Authentication Technique and Procedure Rules, 2015) Version 1.3 April 2017 Controller

More information

Certification Practice Statement

Certification Practice Statement SWIFT SWIFT Qualified Certificates Certification Practice Statement This document applies to SWIFT Qualified Certificates issued by SWIFT. This document is effective from 1 July 2016. 17 June 2016 SWIFT

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Version 1.17 April 7, 2017 1 03/08/2016 Signature Page Jeffrey C. Brown Digitally signed by Jeffrey C. Brown DN: dc=com, dc=raytheon,

More information

Cryptography Standard

Cryptography Standard Cryptography Standard Version: 1.5 Document ID: 3537 Copyright Notice Copyright 2017, ehealth Ontario All rights reserved No part of this document may be reproduced in any form, including photocopying

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Smart Meters Programme Schedule 2.1

Smart Meters Programme Schedule 2.1 Smart Meters Programme Schedule 2.1 (DCC Requirements) (SMKI version) V1.2 1 Schedule 2.1 (DCC Requirements) This Schedule 2.1 (DCC Requirements) is formed of the following parts: Part A Introduction...3

More information

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3.

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3. Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.3.2 May 30, 2007 Copyright 2007, Operational Research Consultants,

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2

Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2 Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone Version 0.2 1 Table of contents 1 INTRODUCTION...6 1.1 Overview... 6 1.2 Document Name and Identification... 6 1.3 Community and Applicability...

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Avira Certification Authority Policy

Avira Certification Authority Policy Avira Certification Authority Policy Version: 1.0 Status: Draft Updated: 2010-03-09 Copyright: Avira GmbH Author: omas Merkel Introduction is document describes the Certification Policy (CP) of Avira Certification

More information

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited. Certificate Practice Statement v3.6 Certificate Practice Statement from Digi-Sign Limited. Digi-CPS Version 3.6. Produced by the Legal & Technical Departments For further information, please contact: CONTACT:

More information

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations EXCERPT NIST Special Publication 800-171 R1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations An Excerpt Listing All: Security Requirement Families & Controls Security

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy

Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Version 1.9 March 6, 2017 Copyright, Northrop Grumman, 2006 1-1 Document Change History NG PKI Certificate Policy VER DATE INFORMATION

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

Volvo Group Certificate Practice Statement

Volvo Group Certificate Practice Statement Volvo Group PKI Documentation Volvo Group Certificate Practice Statement Document name: Volvo Group Certificate Policy Statement Document Owner: Volvo Group AB Corporate Process & IT Issued by: Volvo Group

More information

Certificate Policy (ETSI EN ) Version 1.1

Certificate Policy (ETSI EN ) Version 1.1 Certificate Policy (ETSI EN 319 411-2) Version 1.1 IDnow GmbH Auenstr. 100 80469 Munich 09.06.2017 IDnow Certificate Policy (ETSI EN 319 411-2) Version 1.1 Date 09.06.2017 Author Armin Bauer, IDnow GmbH

More information

QUICKSIGN Registration Policy

QUICKSIGN Registration Policy QUICKSIGN Registration Policy Amendment to DOCUSIGN FRANCE s Certificate Policy for using the QUICKSIGN platform as a registration service to identify Subscribers September 27, 2016 QUICKSIGN_Registration_Policy_V1.0

More information

CERN. CERN Certification Authority Certificate Policy and Certificate Practice Statement DRAFT. Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev

CERN. CERN Certification Authority Certificate Policy and Certificate Practice Statement DRAFT. Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev CERN European Organization for Nuclear Research Category: CP/CPS Status: published Document: CERN Certification Authority CP- CPS.docxpdf Editors: Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev Date

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/protect/ndcbf_

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

ENTITY AUTHENTICATION USING PUBLIC KEY CRYPTOGRAPHY DRAFT

ENTITY AUTHENTICATION USING PUBLIC KEY CRYPTOGRAPHY DRAFT FIPS PUB JJJ FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 1996 March 29 U.S. DEPARTMENT OF COMMERCE / National Institute of Standards and Technology ENTITY AUTHENTICATION USING PUBLIC KEY CRYPTOGRAPHY

More information

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0 Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

The following security and privacy-related audits and certifications are applicable to the Lime Services:

The following security and privacy-related audits and certifications are applicable to the Lime Services: LIME SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: September 26, 2016 FinAccel s Corporate Trust Commitment FinAccel (FinAccel Pte Ltd) is committed to achieving and maintaining the trust of our customers.

More information

Executive Order 13556

Executive Order 13556 Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program

More information

SWAMID Identity Assurance Level 2 Profile

SWAMID Identity Assurance Level 2 Profile Document SWAMID Identity Assurance Level 2 Profile Identifier http://www.swamid.se/policy/assurance/al2 Version V1.0 Last modified 2015-12-02 Pages 11 Status FINAL License Creative Commons BY-SA 3.0 SWAMID

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

United States Department of Defense External Certification Authority X.509 Certificate Policy

United States Department of Defense External Certification Authority X.509 Certificate Policy United States Department of Defense External Certification Authority X.509 Certificate Policy Version 4.3 4 January 2012 THIS PAGE INTENTIONALLY LEFT BLANK ii TABLE OF CONTENTS 1 Introduction...1 1.1 Overview...1

More information

Unisys Corporation April 28, 2017

Unisys Corporation April 28, 2017 Unisys Internal PKI v1 14.docx Unisys Internal PKI Unisys Corporation April 28, 2017 Page 1 of 79 Content: Name: Version / Last Revision: Classification: Unisys Internal PKI v1 14.docx This document contains

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: T. Okubo ICANN January 2013

Internet Engineering Task Force (IETF) Request for Comments: ISSN: T. Okubo ICANN January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6841 Category: Informational ISSN: 2070-1721 F. Ljunggren Kirei AB AM. Eklund Lowinder.SE T. Okubo ICANN January 2013 Abstract A Framework for

More information

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance)

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) Version 0.7 Mar-17 Notice to all parties seeking to rely Reliance on a Certificate

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

Digi-Sign Certification Services Limited Certification Practice Statement (OID: )

Digi-Sign Certification Services Limited Certification Practice Statement (OID: ) Digi-Sign Certification Services Limited Certification Practice Statement (OID: 1.3.6.1.4.1.8420.1.3.6) In support of Digi-Sign CA as a Recognized Certification Authority December 2015 Copyright and Patent

More information

Dark Matter L.L.C. DarkMatter Certification Authority

Dark Matter L.L.C. DarkMatter Certification Authority Dark Matter L.L.C. DarkMatter Certification Authority Certification Practice Statement V1.6 July 2018 1 Signature Page Chair, DarkMatter PKI Policy Authority Date 2 Document History Document Version Document

More information

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls

Mapping of FedRAMP Tailored LI SaaS Baseline to ISO Security Controls Mapping of FedRAMP Tailored LI SaaS Baseline to ISO 27001 Security Controls This document provides a list of all controls that require the Cloud Service Provider, Esri, to provide detailed descriptions

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Trust Services Practice Statement

Trust Services Practice Statement Trust Services Practice Statement TrustWeaver AB V. 1.2 PUBLIC Page 1 IMPORTANT LEGAL NOTICE Copyright 2016, TrustWeaver AB. All rights reserved. This document contains TrustWeaver AB proprietary information,

More information

Identity Assurance Profiles Bronze and Silver. January 14, 2013 Version 1.2 Rev. 5 Release Candidate

Identity Assurance Profiles Bronze and Silver. January 14, 2013 Version 1.2 Rev. 5 Release Candidate Identity Assurance Profiles Bronze and Silver January 14, 2013 Version 1.2 Rev. 5 Release Candidate EXECUTIVE SUMMARY Identity Assurance Profiles, as described in the InCommon Identity Assurance Assessment

More information

Gatekeeper Public Key Infrastructure Framework. Information Security Registered Assessors Program Guide

Gatekeeper Public Key Infrastructure Framework. Information Security Registered Assessors Program Guide Gatekeeper Public Key Infrastructure Framework Information Security Registered Assessors Program Guide V 2.1 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work is copyright.

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

Electronic Signature Policy

Electronic Signature Policy Electronic Signature Policy Definitions The following terms are used in this policy. Term Definition Electronic Signature An electronic signature is a paperless method used to authorize or approve documents

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No. ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below

More information

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Utilities Opower Solution Extension Partner SSO Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information